summaryrefslogtreecommitdiff
path: root/src/stls/stls_s6tlsc.c
diff options
context:
space:
mode:
authorLaurent Bercot <ska-skaware@skarnet.org>2020-11-20 23:24:29 +0000
committerLaurent Bercot <ska-skaware@skarnet.org>2020-11-20 23:24:29 +0000
commit5715c21a077ee1c2fe8957cb4adcea14fd2eda6b (patch)
treecf3e992dce2d426727b535703b0b73dbafb41dbb /src/stls/stls_s6tlsc.c
parent1fea1f6ed53cae7f752c9a78271c7c8367b0ad03 (diff)
downloads6-networking-5715c21a077ee1c2fe8957cb4adcea14fd2eda6b.tar.xz
Refactor tls code to support ucspi-tls
That includes: - new architecture: the tls binary is now a child of the app instead of the other way around - the sbearssl_run engine now takes a post-handshake callback. This allows s6-tlsc and s6-tlsd to only exec into the app when the handshake succeeds (which was already the case with libressl). - new binaries s6-tlsc-io and s6-tlsd-io encapsulate the crypto code; they init and run the engine, connecting to 4 already open fds (stdin/stdout = network, argv[1] and argv[2] = local) - s6-tlsc is now a simple wrapper around s6-tlsc-io - s6-tlsd is now a simple wrapper around s6-tlsd-io - new binary: s6-ucspitlsd, which is also a wrapper around s6-tlsd-io, but differently: the parent execs the app which should be ucspi-tls-aware, the child waits for a command from the parent and execs into s6-tlsd-io if it receives it.
Diffstat (limited to 'src/stls/stls_s6tlsc.c')
-rw-r--r--src/stls/stls_s6tlsc.c86
1 files changed, 0 insertions, 86 deletions
diff --git a/src/stls/stls_s6tlsc.c b/src/stls/stls_s6tlsc.c
deleted file mode 100644
index 9a6dcc3..0000000
--- a/src/stls/stls_s6tlsc.c
+++ /dev/null
@@ -1,86 +0,0 @@
-/* ISC license. */
-
-#include <unistd.h>
-#include <errno.h>
-#include <tls.h>
-#include <skalibs/strerr2.h>
-#include <skalibs/env.h>
-#include <skalibs/djbunix.h>
-#include <s6-networking/stls.h>
-#include "stls-internal.h"
-
-#define diecfg(cfg, s) strerr_diefu3x(96, (s), ": ", tls_config_error(cfg))
-#define diectx(e, ctx, s) strerr_diefu3x(e, (s), ": ", tls_error(ctx))
-
-int stls_s6tlsc (char const *const *argv, char const *const *envp, tain_t const *tto, uint32_t preoptions, uint32_t options, uid_t uid, gid_t gid, unsigned int verbosity, char const *servername, int *sfd)
-{
- int fds[5] = { sfd[0], sfd[1], sfd[0], sfd[1] } ;
- struct tls *ctx ;
- struct tls_config *cfg ;
- pid_t pid ;
- char const *x ;
- int wstat ;
-
- if (tls_init() < 0) strerr_diefu1sys(111, "tls_init") ;
- cfg = tls_config_new() ;
- if (!cfg) strerr_diefu1sys(111, "tls_config_new") ;
-
- x = env_get2(envp, "CADIR") ;
- if (x)
- {
- if (tls_config_set_ca_path(cfg, x) < 0)
- diecfg(cfg, "tls_config_set_ca_path") ;
- }
- else
- {
- x = env_get2(envp, "CAFILE") ;
- if (x)
- {
- if (tls_config_set_ca_file(cfg, x) < 0)
- diecfg(cfg, "tls_config_set_ca_file") ;
- }
- else strerr_dief1x(100, "no trust anchor found - please set CADIR or CAFILE") ;
- }
-
- if (preoptions & 1)
- {
- x = env_get2(envp, "CERTFILE") ;
- if (!x) strerr_dienotset(100, "CERTFILE") ;
- if (tls_config_set_cert_file(cfg, x) < 0)
- diecfg(cfg, "tls_config_set_cert_file") ;
-
- x = env_get2(envp, "KEYFILE") ;
- if (!x) strerr_dienotset(100, "KEYFILE") ;
- if (tls_config_set_key_file(cfg, x) < 0)
- diecfg(cfg, "tls_config_set_key_file") ;
- }
-
- if (tls_config_set_ciphers(cfg, "secure") < 0)
- diecfg(cfg, "tls_config_set_ciphers") ;
-
- if (tls_config_set_dheparams(cfg, "auto") < 0)
- diecfg(cfg, "tls_config_set_dheparams") ;
-
- if (tls_config_set_ecdhecurve(cfg, "auto") < 0)
- diecfg(cfg, "tls_config_set_ecdhecurve") ;
-
- tls_config_verify(cfg) ;
- tls_config_set_protocols(cfg, TLS_PROTOCOLS_ALL) ;
- tls_config_prefer_ciphers_server(cfg) ;
- if (!servername) tls_config_insecure_noverifyname(cfg) ;
-
- ctx = tls_client() ;
- if (!ctx) strerr_diefu1sys(111, "tls_client") ;
- if (tls_configure(ctx, cfg) < 0) diectx(97, ctx, "tls_configure") ;
-
- pid = stls_prep_spawn_drop(argv, envp, fds, uid, gid, !!(preoptions & 2)) ;
-
- if (tls_connect_fds(ctx, fds[2], fds[3], servername) < 0)
- diectx(97, ctx, "tls_connect_fds") ;
- tls_config_free(cfg) ;
- if (tls_handshake(ctx) < 0) diectx(97, ctx, "perform SSL handshake") ;
-
- wstat = stls_run(ctx, fds, pid, verbosity, options, tto) ;
- if (wstat < 0 && wait_pid(pid, &wstat) < 0) strerr_diefu1sys(111, "wait_pid") ;
- return wait_estatus(wstat) ;
-}